Don't leave aborted URLs in the omnibox unless we're on the NTP.
[chromium-blink-merge.git] / base / process / memory_unittest.cc
blob048c09d38c1ed63fcf647046a0197ee2d1daf00b
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #define _CRT_SECURE_NO_WARNINGS
7 #include "base/process/memory.h"
9 #include <limits>
11 #include "base/compiler_specific.h"
12 #include "base/debug/alias.h"
13 #include "base/strings/stringprintf.h"
14 #include "testing/gtest/include/gtest/gtest.h"
16 #if defined(OS_WIN)
17 #include <windows.h>
18 #endif
19 #if defined(OS_POSIX)
20 #include <errno.h>
21 #endif
22 #if defined(OS_MACOSX)
23 #include <malloc/malloc.h>
24 #include "base/process/memory_unittest_mac.h"
25 #endif
26 #if defined(OS_LINUX)
27 #include <malloc.h>
28 #endif
30 #if defined(OS_WIN)
31 // HeapQueryInformation function pointer.
32 typedef BOOL (WINAPI* HeapQueryFn) \
33 (HANDLE, HEAP_INFORMATION_CLASS, PVOID, SIZE_T, PSIZE_T);
35 const int kConstantInModule = 42;
37 TEST(ProcessMemoryTest, GetModuleFromAddress) {
38 // Since the unit tests are their own EXE, this should be
39 // equivalent to the EXE's HINSTANCE.
41 // kConstantInModule is a constant in this file and
42 // therefore within the unit test EXE.
43 EXPECT_EQ(::GetModuleHandle(NULL),
44 base::GetModuleFromAddress(
45 const_cast<int*>(&kConstantInModule)));
47 // Any address within the kernel32 module should return
48 // kernel32's HMODULE. Our only assumption here is that
49 // kernel32 is larger than 4 bytes.
50 HMODULE kernel32 = ::GetModuleHandle(L"kernel32.dll");
51 HMODULE kernel32_from_address =
52 base::GetModuleFromAddress(reinterpret_cast<DWORD*>(kernel32) + 1);
53 EXPECT_EQ(kernel32, kernel32_from_address);
56 TEST(ProcessMemoryTest, EnableLFH) {
57 ASSERT_TRUE(base::EnableLowFragmentationHeap());
58 if (IsDebuggerPresent()) {
59 // Under these conditions, LFH can't be enabled. There's no point to test
60 // anything.
61 const char* no_debug_env = getenv("_NO_DEBUG_HEAP");
62 if (!no_debug_env || strcmp(no_debug_env, "1"))
63 return;
65 HMODULE kernel32 = GetModuleHandle(L"kernel32.dll");
66 ASSERT_TRUE(kernel32 != NULL);
67 HeapQueryFn heap_query = reinterpret_cast<HeapQueryFn>(GetProcAddress(
68 kernel32,
69 "HeapQueryInformation"));
71 // On Windows 2000, the function is not exported. This is not a reason to
72 // fail but we won't be able to retrieves information about the heap, so we
73 // should stop here.
74 if (heap_query == NULL)
75 return;
77 HANDLE heaps[1024] = { 0 };
78 unsigned number_heaps = GetProcessHeaps(1024, heaps);
79 EXPECT_GT(number_heaps, 0u);
80 for (unsigned i = 0; i < number_heaps; ++i) {
81 ULONG flag = 0;
82 SIZE_T length;
83 ASSERT_NE(0, heap_query(heaps[i],
84 HeapCompatibilityInformation,
85 &flag,
86 sizeof(flag),
87 &length));
88 // If flag is 0, the heap is a standard heap that does not support
89 // look-asides. If flag is 1, the heap supports look-asides. If flag is 2,
90 // the heap is a low-fragmentation heap (LFH). Note that look-asides are not
91 // supported on the LFH.
93 // We don't have any documented way of querying the HEAP_NO_SERIALIZE flag.
94 EXPECT_LE(flag, 2u);
95 EXPECT_NE(flag, 1u);
98 #endif // defined(OS_WIN)
100 #if defined(OS_MACOSX)
102 // For the following Mac tests:
103 // Note that base::EnableTerminationOnHeapCorruption() is called as part of
104 // test suite setup and does not need to be done again, else mach_override
105 // will fail.
107 #if !defined(ADDRESS_SANITIZER)
108 // The following code tests the system implementation of malloc() thus no need
109 // to test it under AddressSanitizer.
110 TEST(ProcessMemoryTest, MacMallocFailureDoesNotTerminate) {
111 // Test that ENOMEM doesn't crash via CrMallocErrorBreak two ways: the exit
112 // code and lack of the error string. The number of bytes is one less than
113 // MALLOC_ABSOLUTE_MAX_SIZE, more than which the system early-returns NULL and
114 // does not call through malloc_error_break(). See the comment at
115 // EnableTerminationOnOutOfMemory() for more information.
116 void* buf = NULL;
117 ASSERT_EXIT(
119 base::EnableTerminationOnOutOfMemory();
121 buf = malloc(std::numeric_limits<size_t>::max() - (2 * PAGE_SIZE) - 1);
123 testing::KilledBySignal(SIGTRAP),
124 "\\*\\*\\* error: can't allocate region.*\\n?.*");
126 base::debug::Alias(buf);
128 #endif // !defined(ADDRESS_SANITIZER)
130 TEST(ProcessMemoryTest, MacTerminateOnHeapCorruption) {
131 // Assert that freeing an unallocated pointer will crash the process.
132 char buf[9];
133 asm("" : "=r" (buf)); // Prevent clang from being too smart.
134 #if ARCH_CPU_64_BITS
135 // On 64 bit Macs, the malloc system automatically abort()s on heap corruption
136 // but does not output anything.
137 ASSERT_DEATH(free(buf), "");
138 #elif defined(ADDRESS_SANITIZER)
139 // AddressSanitizer replaces malloc() and prints a different error message on
140 // heap corruption.
141 ASSERT_DEATH(free(buf), "attempting free on address which "
142 "was not malloc\\(\\)-ed");
143 #else
144 ASSERT_DEATH(free(buf), "being freed.*\\n?\\.*"
145 "\\*\\*\\* set a breakpoint in malloc_error_break to debug.*\\n?.*"
146 "Terminating process due to a potential for future heap corruption");
147 #endif // ARCH_CPU_64_BITS || defined(ADDRESS_SANITIZER)
150 #endif // defined(OS_MACOSX)
152 // Android doesn't implement set_new_handler, so we can't use the
153 // OutOfMemoryTest cases.
154 // OpenBSD does not support these tests either.
155 // TODO(vandebo) make this work on Windows too.
156 #if !defined(OS_ANDROID) && !defined(OS_OPENBSD) && \
157 !defined(OS_WIN)
159 #if defined(USE_TCMALLOC)
160 extern "C" {
161 int tc_set_new_mode(int mode);
163 #endif // defined(USE_TCMALLOC)
165 class OutOfMemoryTest : public testing::Test {
166 public:
167 OutOfMemoryTest()
168 : value_(NULL),
169 // Make test size as large as possible minus a few pages so
170 // that alignment or other rounding doesn't make it wrap.
171 test_size_(std::numeric_limits<std::size_t>::max() - 12 * 1024),
172 signed_test_size_(std::numeric_limits<ssize_t>::max()) {
175 #if defined(USE_TCMALLOC)
176 virtual void SetUp() OVERRIDE {
177 tc_set_new_mode(1);
180 virtual void TearDown() OVERRIDE {
181 tc_set_new_mode(0);
183 #endif // defined(USE_TCMALLOC)
185 protected:
186 void* value_;
187 size_t test_size_;
188 ssize_t signed_test_size_;
191 class OutOfMemoryDeathTest : public OutOfMemoryTest {
192 public:
193 void SetUpInDeathAssert() {
194 // Must call EnableTerminationOnOutOfMemory() because that is called from
195 // chrome's main function and therefore hasn't been called yet.
196 // Since this call may result in another thread being created and death
197 // tests shouldn't be started in a multithread environment, this call
198 // should be done inside of the ASSERT_DEATH.
199 base::EnableTerminationOnOutOfMemory();
203 TEST_F(OutOfMemoryDeathTest, New) {
204 ASSERT_DEATH({
205 SetUpInDeathAssert();
206 value_ = operator new(test_size_);
207 }, "");
210 TEST_F(OutOfMemoryDeathTest, NewArray) {
211 ASSERT_DEATH({
212 SetUpInDeathAssert();
213 value_ = new char[test_size_];
214 }, "");
217 TEST_F(OutOfMemoryDeathTest, Malloc) {
218 ASSERT_DEATH({
219 SetUpInDeathAssert();
220 value_ = malloc(test_size_);
221 }, "");
224 TEST_F(OutOfMemoryDeathTest, Realloc) {
225 ASSERT_DEATH({
226 SetUpInDeathAssert();
227 value_ = realloc(NULL, test_size_);
228 }, "");
231 TEST_F(OutOfMemoryDeathTest, Calloc) {
232 ASSERT_DEATH({
233 SetUpInDeathAssert();
234 value_ = calloc(1024, test_size_ / 1024L);
235 }, "");
238 TEST_F(OutOfMemoryDeathTest, Valloc) {
239 ASSERT_DEATH({
240 SetUpInDeathAssert();
241 value_ = valloc(test_size_);
242 }, "");
245 #if defined(OS_LINUX)
247 #if PVALLOC_AVAILABLE == 1
248 TEST_F(OutOfMemoryDeathTest, Pvalloc) {
249 ASSERT_DEATH({
250 SetUpInDeathAssert();
251 value_ = pvalloc(test_size_);
252 }, "");
254 #endif // PVALLOC_AVAILABLE == 1
256 TEST_F(OutOfMemoryDeathTest, Memalign) {
257 ASSERT_DEATH({
258 SetUpInDeathAssert();
259 value_ = memalign(4, test_size_);
260 }, "");
263 TEST_F(OutOfMemoryDeathTest, ViaSharedLibraries) {
264 // This tests that the run-time symbol resolution is overriding malloc for
265 // shared libraries (including libc itself) as well as for our code.
266 std::string format = base::StringPrintf("%%%zud", test_size_);
267 char *value = NULL;
268 ASSERT_DEATH({
269 SetUpInDeathAssert();
270 EXPECT_EQ(-1, asprintf(&value, format.c_str(), 0));
271 }, "");
273 #endif // OS_LINUX
275 // Android doesn't implement posix_memalign().
276 #if defined(OS_POSIX) && !defined(OS_ANDROID)
277 TEST_F(OutOfMemoryDeathTest, Posix_memalign) {
278 // Grab the return value of posix_memalign to silence a compiler warning
279 // about unused return values. We don't actually care about the return
280 // value, since we're asserting death.
281 ASSERT_DEATH({
282 SetUpInDeathAssert();
283 EXPECT_EQ(ENOMEM, posix_memalign(&value_, 8, test_size_));
284 }, "");
286 #endif // defined(OS_POSIX) && !defined(OS_ANDROID)
288 #if defined(OS_MACOSX)
290 // Purgeable zone tests
292 TEST_F(OutOfMemoryDeathTest, MallocPurgeable) {
293 malloc_zone_t* zone = malloc_default_purgeable_zone();
294 ASSERT_DEATH({
295 SetUpInDeathAssert();
296 value_ = malloc_zone_malloc(zone, test_size_);
297 }, "");
300 TEST_F(OutOfMemoryDeathTest, ReallocPurgeable) {
301 malloc_zone_t* zone = malloc_default_purgeable_zone();
302 ASSERT_DEATH({
303 SetUpInDeathAssert();
304 value_ = malloc_zone_realloc(zone, NULL, test_size_);
305 }, "");
308 TEST_F(OutOfMemoryDeathTest, CallocPurgeable) {
309 malloc_zone_t* zone = malloc_default_purgeable_zone();
310 ASSERT_DEATH({
311 SetUpInDeathAssert();
312 value_ = malloc_zone_calloc(zone, 1024, test_size_ / 1024L);
313 }, "");
316 TEST_F(OutOfMemoryDeathTest, VallocPurgeable) {
317 malloc_zone_t* zone = malloc_default_purgeable_zone();
318 ASSERT_DEATH({
319 SetUpInDeathAssert();
320 value_ = malloc_zone_valloc(zone, test_size_);
321 }, "");
324 TEST_F(OutOfMemoryDeathTest, PosixMemalignPurgeable) {
325 malloc_zone_t* zone = malloc_default_purgeable_zone();
326 ASSERT_DEATH({
327 SetUpInDeathAssert();
328 value_ = malloc_zone_memalign(zone, 8, test_size_);
329 }, "");
332 // Since these allocation functions take a signed size, it's possible that
333 // calling them just once won't be enough to exhaust memory. In the 32-bit
334 // environment, it's likely that these allocation attempts will fail because
335 // not enough contiguous address space is available. In the 64-bit environment,
336 // it's likely that they'll fail because they would require a preposterous
337 // amount of (virtual) memory.
339 TEST_F(OutOfMemoryDeathTest, CFAllocatorSystemDefault) {
340 ASSERT_DEATH({
341 SetUpInDeathAssert();
342 while ((value_ =
343 base::AllocateViaCFAllocatorSystemDefault(signed_test_size_))) {}
344 }, "");
347 TEST_F(OutOfMemoryDeathTest, CFAllocatorMalloc) {
348 ASSERT_DEATH({
349 SetUpInDeathAssert();
350 while ((value_ =
351 base::AllocateViaCFAllocatorMalloc(signed_test_size_))) {}
352 }, "");
355 TEST_F(OutOfMemoryDeathTest, CFAllocatorMallocZone) {
356 ASSERT_DEATH({
357 SetUpInDeathAssert();
358 while ((value_ =
359 base::AllocateViaCFAllocatorMallocZone(signed_test_size_))) {}
360 }, "");
363 #if !defined(ARCH_CPU_64_BITS)
365 // See process_util_unittest_mac.mm for an explanation of why this test isn't
366 // run in the 64-bit environment.
368 TEST_F(OutOfMemoryDeathTest, PsychoticallyBigObjCObject) {
369 ASSERT_DEATH({
370 SetUpInDeathAssert();
371 while ((value_ = base::AllocatePsychoticallyBigObjCObject())) {}
372 }, "");
375 #endif // !ARCH_CPU_64_BITS
376 #endif // OS_MACOSX
378 class OutOfMemoryHandledTest : public OutOfMemoryTest {
379 public:
380 static const size_t kSafeMallocSize = 512;
381 static const size_t kSafeCallocSize = 128;
382 static const size_t kSafeCallocItems = 4;
384 virtual void SetUp() {
385 OutOfMemoryTest::SetUp();
387 // We enable termination on OOM - just as Chrome does at early
388 // initialization - and test that UncheckedMalloc and UncheckedCalloc
389 // properly by-pass this in order to allow the caller to handle OOM.
390 base::EnableTerminationOnOutOfMemory();
394 // TODO(b.kelemen): make UncheckedMalloc and UncheckedCalloc work
395 // on Windows as well.
396 // UncheckedMalloc() and UncheckedCalloc() work as regular malloc()/calloc()
397 // under sanitizer tools.
398 #if !defined(MEMORY_TOOL_REPLACES_ALLOCATOR)
399 TEST_F(OutOfMemoryHandledTest, UncheckedMalloc) {
400 EXPECT_TRUE(base::UncheckedMalloc(kSafeMallocSize, &value_));
401 EXPECT_TRUE(value_ != NULL);
402 free(value_);
404 EXPECT_FALSE(base::UncheckedMalloc(test_size_, &value_));
405 EXPECT_TRUE(value_ == NULL);
408 TEST_F(OutOfMemoryHandledTest, UncheckedCalloc) {
409 EXPECT_TRUE(base::UncheckedCalloc(1, kSafeMallocSize, &value_));
410 EXPECT_TRUE(value_ != NULL);
411 const char* bytes = static_cast<const char*>(value_);
412 for (size_t i = 0; i < kSafeMallocSize; ++i)
413 EXPECT_EQ(0, bytes[i]);
414 free(value_);
416 EXPECT_TRUE(
417 base::UncheckedCalloc(kSafeCallocItems, kSafeCallocSize, &value_));
418 EXPECT_TRUE(value_ != NULL);
419 bytes = static_cast<const char*>(value_);
420 for (size_t i = 0; i < (kSafeCallocItems * kSafeCallocSize); ++i)
421 EXPECT_EQ(0, bytes[i]);
422 free(value_);
424 EXPECT_FALSE(base::UncheckedCalloc(1, test_size_, &value_));
425 EXPECT_TRUE(value_ == NULL);
427 #endif // !defined(MEMORY_TOOL_REPLACES_ALLOCATOR)
428 #endif // !defined(OS_ANDROID) && !defined(OS_OPENBSD) && !defined(OS_WIN)